hyper-tls
v0.6.0 GrowingDefault TLS implementation for use with hyper
Quick Verdict
- โNot updated for 2+ years
- !Pre-1.0: API may have breaking changes
- โMassive adoption (4.9K crates depend on it)
- โPermissive license (MIT/Apache-2.0)
Security
Deep Insights
15.0M downloads in the last 30 days (501.4K/day), up 20% from the previous period.
4.9K crates depend on hyper-tls. Strong ecosystem adoption means battle-tested code and long-term stability.
hyper-tls has only 1 owner despite 4.9K dependents. This is a bus-factor concern โ consider the implications for long-term support.
Despite being 9+ years old, hyper-tls hasn't reached 1.0 yet. Expect potential API changes between versions.
At 15KB, hyper-tls is lightweight. Small crate size correlates with focused, well-scoped functionality.
Notable dependents include reqwest, hyper-timeout, hyper-http-proxy, rusoto_core, opentelemetry-jaeger. When high-quality crates choose hyper-tls, it's a strong quality signal.
Health Breakdown
Recency, release consistency, active ratio
Yanked ratio, deps, size, maturity, features
Reverse deps, ownership, ecosystem
Downloads, momentum, growth trend
Docs, repo, license, metadata
Download Trend
Top Dependents
Most downloaded crates that depend on hyper-tls